With the increasing popularity of open-source software, embedded vulnerabilities have been widely propagating to downstream software. Due to different maintenance policies, software …
H Wang, Z Liu, S Wang, Y Wang… - 2024 IEEE 9th …, 2024 - ieeexplore.ieee.org
Software composition analysis (SCA) has attracted the attention of the industry and academic community in recent years. Given a piece of program source code, SCA facilitates …
Binary code similarity analysis (BCSA) is widely used for diverse security applications, including plagiarism detection, software license violation detection, and vulnerability …
H He, Y Ji, HH Huang - 2022 IEEE 7th European Symposium …, 2022 - ieeexplore.ieee.org
Graph neural networks (GNNs) have been utilized to create multi-layer graph models for a number of cybersecurity applications from fraud detection to software vulnerability analysis …
L Cui, J Yin, J Cui, Y Ji, P Liu, Z Hao… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Analyzing malware based on API call sequences is an effective approach, as these sequences reflect the dynamic execution behavior of malware. Recent advancements in …
B Bowman, HH Huang - ACM SIGOPS Operating Systems Review, 2021 - dl.acm.org
Cybersecurity professionals are inundated with large amounts of data, and require intelligent algorithms capable of distinguishing vulnerable from patched, normal from …
F Ullah, MR Naeem, H Naeem… - … Journal of Intelligent …, 2022 - Wiley Online Library
Software similarity in different programming codes is a rapidly evolving field because of its numerous applications in software development, software cloning, software plagiarism, and …
Y Gu, H Shu, F Kang - Computers & Security, 2023 - Elsevier
Binary code vulnerability detection is an important research direction in the field of network security. The extensive reuse of open-source code has led to the spread of vulnerabilities …
Q Zhou, Q Wu, D Liu, S Ji, K Lu - Proceedings of the 2022 ACM SIGSAC …, 2022 - dl.acm.org
Security bugs like memory errors are constantly introduced to software programs, and recent years have witnessed an increasing number of reported security bugs. Traditional detection …